Healthcare Orgs, Take Control of Your Network! Level Up Cyber Hygiene with Diligent Vendor Vetting and Software Segmentation

Spacelabs Healthcare Banner Ad

 

The digital transformation of healthcare organizations has significantly increased reliance on software and medtech devices, weaving a complex web of interdependencies in their supply chains. This shift raises critical vulnerabilities as highlighted by infamous incidents like the SolarWinds breach, underscoring the urgency for enhanced cyber hygiene practices. With recent executive orders pushing for better security protocols, healthcare organizations are under pressure to fortify their supply chains against escalating cyber threats.

What strategies can healthcare organizations employ to effectively manage the cyber hygiene of their healthcare supply chain, including software and medtech devices?

Robin Berthier, CEO and founder of Network Perception, advocates for rigorous cyber hygiene practices within healthcare supply chains on a recent episode of Expert’s Talk. He emphasizes the necessity of standard vendor questionnaires and robust security protocols and underscores the importance of continuous vendor risk assessments and software segmentation to effectively mitigate potential cyber threats, drawing lessons from major breaches like SolarWinds.

Key takeaways:

  1. Develop Standard Questionnaires for Vendors: Establishing standard questionnaires for all vendors can help assess the risks introduced by third parties and ensure they adhere to secure coding best practices.
  2. Vet Vendor Security Practices: It’s crucial to scrutinize the security practices surrounding the build environments of vendors to prevent incidents similar to the SolarWinds breach, where malware was inserted directly into the source code.
  3. Implement Software Segmentation: By applying segmentation to software, organizations can contain potential breaches within manageable risk levels, thereby minimizing widespread impact.
  4. Regular Patching and Updates: Ensuring that all software and devices within the supply chain are regularly updated and patched can significantly reduce vulnerabilities.
  5. Continuous Risk Assessment: Continual evaluation of the risks posed by vendors and their products is essential to adapting and strengthening cybersecurity measures over time.

Article written by Sonia Gossai

Follow us on social media for the latest updates in B2B!

Image

Latest

hospitality
Using Technology to Elevate Hospitality
April 28, 2025

The hospitality industry is undergoing a rapid transformation, driven by the rising expectation for hyper-effortless, personalized guest experiences. Across industries, research from McKinsey shows that 71 percent of consumers expect companies to deliver personalized interactions—raising the bar for service excellence in every sector, including hospitality. As hotels, casinos, and resorts race to meet evolving demands,…

Read More
School infrastructure
Can a Docuseries Change the Way Communities Think About School Infrastructure Reform?
April 28, 2025

School infrastructure in the United States is in a critical condition. According to the U.S. Government Accountability Office (GAO), an estimated 54% of public school districts report needing upgrades or replacements for multiple building systems, such as HVAC, roofing, and structural elements. In a few states (like Idaho), the situation is compounded by laws…

Read More
dock scheduling
C3 Solutions Boosts Delivery Speed Through Intelligent Dock Scheduling and Yard Automation
April 28, 2025

Logistics networks continue to grow more complex as supply chains race to meet rising ecommerce demand. As of 2024, 80% of consumers expect retailers to offer same-day delivery, with 30% anticipating this service to be free. This pressure is pushing supply chain operators to modernize traditionally overlooked segments like yard management and dock scheduling….

Read More
trucking
The People Business: Keep on Truckin’ & Earning A Good Income
April 28, 2025

In this Career Paths episode of The AppleOne Podcast, host Brett Howroyd explores the essential—and often underestimated—world of trucking with two guests who know it well: Chip Stewart, VP of Service Operations at Select Transportation Resources in Houston, and Jill Apperson, Area Manager at AppleOne in North Carolina. Together, they break down why trucking…

Read More